資訊安全
相關書籍
-
Progress in Cryptology – INDOCRYPT 2017: 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Trusted Computing and Information Security: 11th Chinese Conference, CTCIS 2017, Changsha, China, September 14-17, 2017, Proceedings (Communications in Computer and Information Science)$2,430$2,381 -
Information Theoretic Security: 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
Security, Privacy, and Applied Cryptography Engineering: 7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Serious Cryptography: A Practical Introduction to Modern Encryption (Paperback)$1,810$1,719 -
Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong ... Part III (Lecture Notes in Computer Science)$2,430$2,381 -
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges: Threats and Counter Efforts (Terrorism, Security, and Computation)$7,970$7,810 -
Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Internal Audit and IT Audit)$8,920$8,741 -
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product (Internal Audit and IT Audit)$3,480$3,306 -
Codes, Cryptology and Curves with Computer Algebra$7,830$7,673 -
VIP 95折
Codes, Cryptology and Curves with Computer Algebra$2,145$2,037 -
PoC or GTFO (Hardcover)$1,510$1,479 -
VIP 95折
Private Security: An Introduction to Principles and Practice$5,130$4,873 -
VIP 95折
Agile Application Security: Enabling Security in a Continuous Delivery Pipeline$1,930$1,833 -
Principles and Implementation Techniques of Software-Based Fault Isolation (Foundations and Trends(r) in Privacy and Security)$2,360$2,312 -
Selected Areas in Cryptography – SAC 2016: 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers (Lecture Notes in Computer Science)$2,430$2,381 -
VIP 95折
Why CISOs Fail: The Missing Link in Security Management--and How to Fix It (Internal Audit and IT Audit)$2,160$2,052 -
Fundamental of Cyber Security$1,260$1,234 -
Aviation Security, Privacy, Data Protection and Other Human Rights: Technologies and Legal Principles (Law, Governance and Technology Series)$7,970$7,810 -
VIP 95折
Security and Resilience in Intelligent Data-Centric Systems and Communication Networks (Intelligent Data-Centric Systems: Sensor Collected Intelligence)$4,560$4,332 -
50折
$990Intelligence-Driven Incident Response: Outwitting the Adversary -
IT Convergence and Security 2017: Volume 2 (Lecture Notes in Electrical Engineering)$6,820$6,683 -
IT Convergence and Security 2017: Volume 1 (Lecture Notes in Electrical Engineering)$8,730$8,555 -
VIP 95折
Cyber-Physical Security and Privacy in the Electric Smart Grid$1,230$1,168 -
VIP 95折
The EU General Data Protection Regulation (GDPR): A Practical Guide$6,680$6,346 -
VIP 95折
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide and CCSP CBK Kit$4,740$4,503 -
Resilience and Risk: Methods and Application in Environment, Cyber and Social Domains (NATO Science for Peace and Security Series C: Environmental Security)$9,880$9,682 -
VIP 95折
Network Security$9,530$9,053